Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs WSO2 Identity Server comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
WSO2 Identity Server
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
11
Ranking in other categories
Customer Identity and Access Management (CIAM) (12th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 11.6%, down 20.0% compared to last year.
WSO2 Identity Server, on the other hand, focuses on Customer Identity and Access Management (CIAM), holds 2.2% mindshare, down 2.8% since last year.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
WALLIX Bastion5.1%
Delinea Secret Server5.0%
Other78.3%
Privileged Access Management (PAM)
Customer Identity and Access Management (CIAM) Market Share Distribution
ProductMarket Share (%)
WSO2 Identity Server2.2%
Auth0 Platform15.2%
Okta Platform13.9%
Other68.7%
Customer Identity and Access Management (CIAM)
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
Ritesh_Shah - PeerSpot reviewer
Senior Solution Architect at Hewlett Packard Enterprise
Utilizing key management and seamless single sign-on integration for enhanced user profile management
WSO2 Identity Server's key management feature stands out as a particularly impactful feature for enhancing security. Additionally, from a user perspective, the self-user portal and user profile management capabilities are highly valuable. It allows users to manage their profiles, change passwords, and offers a self-care portal type of functionality. The single sign-on capability integrates seamlessly with various platforms, including Google, Facebook, LDAP, and Active Directory, which supports rapid product launches.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We like it for the ability to automatically change passwords. At least for my group, that's the best thing."
"The session recording and monitoring capabilities are valuable. We have real-time session management ability to record, audit, and monitor any privileged user activities. That is a big deal."
"The regulation of accounts is by far the most needed and valuable part of the application."
"You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
"CyberArk's capabilities and functionality outperform other solutions."
"Super stable and easy to scale"
"It is very simple to use."
"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."
"I am completely satisfied with WSO2 Identity Server and would definitely recommend it to other companies."
"The product's initial setup phase is easy."
"It's very easy to implement everything."
"The solution gets the job done, and we don't have to do the main configuration."
"The keystore feature has been most valuable for us."
"The product provides easy integration between API manager and IT server components."
"We use the solution for customer identity management, authenticating customers coming in through a web portal."
"I would rate the solution's stability eight or nine out of ten."
 

Cons

"There was a situation when one of our presidents had an issue, but I can't recall the specifics."
"Customer support is somewhat lacking. They are often unavailable on Fridays, and the support process, such as raising a call or case, can take too long."
"The initial setup can get complex."
"The tool needs to improve its usage and interface. They need to have a modern and useful interface. I want the product to improve its integration capabilities as well since some of the integration features do not work always."
"Their support can be better. Their SLA timings are higher than others."
"In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot."
"Make it easier to deploy."
"A notable request I have regarding CyberArk Privileged Access Manager is to address the issues of database corruption identified in cluster environments experienced by multiple clients."
"This solution requires extensive knowledge to be used effectively as certain areas of its use are not user friendly."
"The solution seems to be pretty outdated."
"The high availability architecture has to be improved."
"I found the initial setup to be very complex."
"Sometimes working with the code is difficult because I search for documentation about the code and how to work with the code, which is where I believe they should improve, by providing some documentation on how to work with the code."
"The solution's licensing model could be more flexible, and pricing could be improved."
"This solution does not have BPM workflows already integrated, we had to integrate the BPM module externally. They do not provide full-featured auditing and certification modules out of the box."
"The solution could improve its development from a user perspective."
 

Pricing and Cost Advice

"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"I'm aware that the organization had purchased licensing for almost all of CyberArk's solutions including licensing for PTA, EPM, and the Application Identity Manager. But when it comes to PSM, this is one of the components where there's an additional charge for any extra PSMs that you want to deploy. I believe that there's some rider where the vendor has a bit of leeway to, at times, charge a premium on whatever additional services you may require above the board."
"If you want a Ferrari, it will cost you. The solution is really nice, so it costs the client, but in the long run, it is very good. If you buy a solution that costs a lot to maintain because it is not stable, and you are frequently asking for consultant support, it costs more."
"The solution is costly but we get what we pay for."
"CyberArk Enterprise Password Vault's pricing is reasonable."
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers."
"They should bring in some good pricing models to host the marketplace."
"WSO2 Identity Server is not an expensive solution."
"I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution."
"I have found the solutions license is priced competitively compared to others."
"At this time we are working with the open-source version."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
Financial Services Firm
10%
Transportation Company
10%
Comms Service Provider
9%
Media Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What is your experience regarding pricing and costs for WSO2 Identity Server?
The pricing is currently the same as the API Manager, so it's not surprising. Since we used it primarily for SSO and the self portal, there were no additional pricing concerns.
What needs improvement with WSO2 Identity Server?
Currently, all required features are supported. If new use cases for artificial intelligence arise, it could be beneficial to incorporate those. However, for our current projects, WSO2 Identity Ser...
What is your primary use case for WSO2 Identity Server?
We deployed WSO2 Identity Server to fulfill our single sign-on (SSO) requirements. Whenever we implement the API Manager, instead of using the API Manager's inbuilt key manager, we use WSO2 Identit...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Nutanix, ELM, AlmavivA, BDigital, StubHub, M-creations, MedVision360
Find out what your peers are saying about CyberArk Privileged Access Manager vs. WSO2 Identity Server and other solutions. Updated: January 2023.
881,082 professionals have used our research since 2012.